Abstract
Several organizations are implementing large-scale Internet of Things (IoT)-based ecosystems, such as Industrial IoT (IIoT). Such systems are vulnerable to new threats and intrusions because of the nature of their networks. It is necessary to secure such systems by developing feature selection integrated with robust machine learning models. In this paper, a two-phase IIoT traffic prediction model is built for detecting normal and anomalous IIoT behavior. The system is divided into two phases. In the first phase, multi-objective non-dominated sorting with whale optimization approach (MNSWOA) and ideal point method (IPM) is implemented for feature selection. The key quality attributes are retrieved for effective classification. In the second phase, the feature selection results are sent to the random forest (RF) classifier for traffic prediction. Experimental results on IIoT datasets, namely CTU-13, AWID and Gas–Water show that the proposed technique MNSWOA–IPM–RF obtains enhanced performance in terms of accuracy, true positive rate, true negative rate and area under the ROC curve. Also, comparisons indicate that the proposed MNSWOA–IPM–RF model has superior results than benchmark multi-objective optimization techniques.
Similar content being viewed by others
References
Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. In: International Conference on Critical Infrastructure Protection. Springer, Berlin, pp 65–78
Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Jhaveri RH, Chowdhary CL (2021) Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research. Mathematics 9(6):690
Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH (2021) A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7):751
Satapathy SC, Naik A (2014) Modified teaching–learning-based optimization algorithm for global numerical optimization—a comparative study. Swarm Evol Comput 16:28–37
Li AD, He Z, Zhang Y (2016) Bi-objective variable selection for key quality characteristics selection based on a modified NSGA-II and the ideal point method. Comput Ind 82:95–103
Xue B, Zhang M, Browne WN, Yao X (2015) A survey on evolutionary computation approaches to feature selection. IEEE Trans Evol Comput 20(4):606–626
Mistry K, Zhang L, Neoh SC, Lim CP, Fielding B (2016) A micro-GA embedded PSO feature selection approach to intelligent facial emotion recognition. IEEE Trans Cybern 47(6):1496–1509
Rosales-Pérez A, García S, Gonzalez JA, Coello CAC, Herrera F (2017) An evolutionary multiobjective model and instance selection for support vector machines with pareto-based ensembles. IEEE Trans Evol Comput 21(6):863–877
Li AD, He Z (2020) Multiobjective feature selection for key quality characteristic identification in production processes using a nondominated-sorting-based whale optimization algorithm. Comput Ind Eng 149:106852
Nguyen HB, Xue B, Liu I, Andreae P, Zhang M (2016) New mechanism for archive maintenance in PSO-based multi-objective feature selection. Soft Comput 20(10):3927–3946
Amoozegar M, Minaei-Bidgoli B (2018) Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism. Expert Syst Appl 113:499–514
Zhang Y, Cheng S, Shi Y, Gong DW, Zhao X (2019) Cost-sensitive feature selection using two-archive multi-objective artificial bee colony algorithm. Expert Syst Appl 137:46–58
Hancer E, Xue B, Zhang M, Karaboga D, Akay B (2018) Pareto front feature selection based on artificial bee colony optimization. Inf Sci 422:462–479
Zhu Y, Liang J, Chen J, Ming Z (2017) An improved NSGA-III algorithm for feature selection used in intrusion detection. Knowl-Based Syst 116:74–85
Li AD, He Z, Wang Q, Zhang Y (2019) Key quality characteristics selection for imbalanced production data using a two-phase bi-objective feature selection method. Eur J Oper Res 274(3):978–989
Abdel-Basset M, Chang V, Hawash H, Chakrabortty RK, Ryan M (2020) Deep-IFS: intrusion detection approach for IIoT traffic in fog environment. IEEE Trans Ind Inf 17(11):7704–7715
Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A (2020) TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8:165130–165150
Latif S, Idrees Z, Zou Z, Ahmad J (2020) DRaNN: a deep random neural network model for intrusion detection in industrial IoT. In: 2020 International Conference on UK–China Emerging Technologies (UCET). IEEE, pp 1–4
Eroglu DY, Kilic K (2017) A novel hybrid genetic local search algorithm for feature selection and weighting with an application in strategic decision making in innovation management. Inf Sci 405:18–32
Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9):6154–6162
De Souza CA, Westphall CB, Machado RB, Sobral JBM, dos Santos Vieira G (2020) Hybrid approach to intrusion detection in fog-based IoT environments. Comput Netw 180:107417
Hosseini S, Zade BMH (2020) New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput Netw 173:107168
Roopak M, Tian GY, Chambers J (2020) Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Netw 9(3):120–127
Hosseini S (2020) A new machine learning method consisting of GA-LR and ANN for attack detection. Wirel Netw 26(6):4149–4162
Wang C, Wang B, Liu H, Qu H (2020) Anomaly detection for industrial control system based on autoencoder neural network. Wirel Commun Mob Comput 2020:1–10
Jang JW, Kwon S, Kim S, Seo J, Oh J, Lee KH (2020) Cybersecurity framework for IIoT-based power system connected to microgrid. KSII Trans Internet Inf Syst (TIIS) 14(5):2221–2235
Taghavinejad SM, Taghavinejad M, Shahmiri L, Zavvar M, Zavvar MH (2020) Intrusion detection in IoT-based smart grid using hybrid decision tree. In: 2020 6th International Conference on Web Research (ICWR). IEEE, pp 152–156
SumaiyaThaseen I, SairaBanu J, Lavanya K, RukunuddinGhalib M, Abhishek K (2021) An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. Trans Emerg Telecommun Technol 32(2):e4014
Tsogbaatar E, Bhuyan MH, Taenaka Y, Fall D, Gonchigsumlaa K, Elmroth E, Kadobayashi Y (2021) DeL-IoT: a deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14(100391):1–21
Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of Things attack detection using hybrid deep learning model. Comput Commun 176:146–151
Yu K, Guo Z, Shen Y, Wang W, Lin JCW, Sato T (2021) Secure artificial Intelligence of Things for implicit group recommendations. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3079574
Tan L, Xiao H, Yu K, Aloqaily M, Jararweh Y (2021) A blockchain-empowered crowdsourcing system for 5g-enabled smart cities. Comput Stand Interfaces 76(103517):1–21
Tan L, Shi N, Yu K, Aloqaily M, Jararweh Y (2021) A blockchain-empowered access control framework for smart devices in green Internet of Things. ACM Trans Internet Technol (TOIT) 21(3):1–20
Feng C, Yu K, Bashir AK, Al-Otaibi YD, Lu Y, Chen S, Zhang D (2021) Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Netw 35(1):130–137
Zhen L, Bashir AK, Yu K, Al-Otaibi YD, Foh CH, Xiao P (2020) Energy-efficient random access for LEO satellite-assisted 6G internet of remote things. IEEE Internet Things J 8(7):5114–5128
Nie L, Wang X, Wang S, Ning Z, Obaidat M, Sadoun B, Li S (2021) Network traffic prediction in industrial Internet of Things backbone networks: a multi-task learning mechanism. IEEE Trans Ind Inform 17:7123–7132
Zhou F, Qu H, Liu H, Liu H, Li B (2021) Fingerprinting IIoT devices through machine learning techniques. J Signal Process Syst 93:779–794
Ullah I, Mahmoud QH (2021) Network traffic flow based machine learning technique for IoT device identification. In: 2021 IEEE International Systems Conference (SysCon). IEEE, pp 1–8
Rajawat AS, Rawat R, Barhanpurkar K, Shaw RN, Ghosh A (2021) Vulnerability analysis at industrial Internet of Things platform on dark web network using computational intelligence. Comput Intell Syst Appl 950:39–51
Moustafa N (2021) A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain Cities Soc 72(102994):1–14
Deb K, Jain H (2013) An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: solving problems with box constraints. IEEE Trans Evol Comput 18(4):577–601
Li X, Xu M, Vijayakumar P, Kumar N, Liu X (2020) Detection of low-frequency and multi-stage attacks in industrial Internet of Things. IEEE Trans Veh Technol 69(8):8820–8831
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67
Xue B, Zhang M, Browne WN (2012) Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans Cybern 43(6):1656–1671
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ikram, S.T., Priya, V., Anbarasu, B. et al. Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier. J Supercomput 78, 10725–10756 (2022). https://doi.org/10.1007/s11227-021-04284-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04284-4